Chapter 4: Scanning Networks
As an ethical hacker, or possibly the attacker ourselves, we've gone through and completed some of the first steps of attacking networks and systems. The first step we did was our reconnaissance in the previous chapter. If you're not familiar with that phrase, or what those steps involve, you need to go back to that chapter. Reconnaissance gave us a perfect view of the network. Now, it's time to get specific. In this chapter, we're going to get a little more active and involved.
In the initial stages of looking at our target, we did our footprinting and reconnaissance. Now, it's time to scan. This chapter will ensure you understand what you're doing and what scanning is.
You may be thinking, Wait, I thought we achieved everything we needed to achieve during the reconnaissance stage! Well, we didn't get as much information as we needed. And that's the whole goal here. Again, if the attacker can find out as much...